Case Study
Case Study
Case Study 1: The Bangladesh Bank Heist (2016) – $81 Million Cyber Theft
Overview: The cyber theft began when emails containing malicious software
compromised the system of Bangladesh Bank. Playing with different time zones of
three separate financial institutions, the hackers made fraudulent bank transfers.
Due to different operating hours, it allowed the hackers to seamlessly transfer $81
million to be laundered in the Philippines.
Recommendations:
Financial institutions shall ensure that they uphold their duty of extraordinary
diligence at all times, even after their operating hours. This can be made by
creating centralized communications for all banks around the world, wherein it is
easy for them to get in touch with each other whenever there are urgent concerns
outside operating hours. In addition, all employees should have regular training
sessions to enhance their ability to identify suspicious links, cyberattack attempts,
and unusual transactions. These security measures can make a difference to
strengthen their security and uphold their duty.
Case Study 2: The Carbanak Cybercrime Group (2013–2020) – $1 Billion
Bank Heist
Overview: For years, the cybercrime gangs Carbanak and Cobalt used an
advanced malicious software to get unauthorized access to several banks across
Europe and globally. The said groups targeted the vulnerabilities in banking security
infrastructure and took advantage of the emerging technology, cryptocurrency, to
launder the stolen money.
Case Study 3: The Equifax Data Breach (2017) – 147 Million Records
Exposed
Recommendations:
Operating a business that requires the collection of personal information calls for
the implementation of a centralized network division. This policy ensures that each
network has an independent system to defend against cyberattacks. In this way, if
one division becomes compromised, the entire network is not affected, hence, it
prevents hackers from gathering all information. In addition, it is easier to manage a
small data breach rather than to trace down a large-scale data breach.
IV. Compare the Bangladesh Bank Heist (2016), Carbanak Attacks (2013–
2020), and Equifax Data Breach (2017). What were the key similarities and
differences in how these financial cyberattacks were executed?
Key Similarities:
1. The Bangladesh Bank Heist and Carbanak Attacks were executed because of
phishing activities that involve emails containing malicious software.
2. Bangladesh Bank and targeted financial institutions in Carbanak Attacks
employees lack the necessary skills to identify security vulnerabilities.
3. All three of the attacks involve valued items such as personal information and
money.
Key Differences:
1. Only Equifax Data Breach involves personal information such as names and
social security numbers to be breached.
2. The Bangladesh Bank Heist involves playing with time zone differences.
3. The Carbanak Atatcks use ATMs to dispense money and use cryptocurrency
to launder stolen money.
V. What were the major regulatory consequences faced by Equifax after
the breach? How does this compare to financial institutions in the
Philippines under R.A. 10173 (Data Privacy Act of 2012)?
Equifax faced massive multimillion-dollar fines to settle a major data breach that
compromised millions of people’s personal information. This case can be compared
to financial institutions in a way that if one does expose personal data belonging to
clients, it can still be held responsible even if it is done unknowingly. As a result, the
company may face legal consequences such as civil charges and be required to pay
fines to settle the issues.
Keeping the ATM software separate from other systems helps to avoid being
compromised by malicious software. This way, even if one system becomes
infected, the malware will be contained and will not spread across the whole
network. Moreover, a consistent monitoring of transactions is necessary to avoid
concealment of fraudulent activities.
VII. What role does AI-based fraud detection play in preventing social
engineering attacks like Carbanak’s phishing campaigns?
Artificial Intelligence instantly and continuously scans and analyzes vast amounts of
data to detect irregular patterns or behaviors within the system. This constant
monitoring allows AI to identify potential security threats in a timely manner before
they escalate and cause significant damage to the network. In addition, AI enhances
security by monitoring for suspicious activities in real time. It can detect phishing
attempts by analyzing messages or emails, such as receiving malicious links and
potentially harmful unknown senders.